<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Handbook_V_-_Maldev</id>
	<title>Handbook V - Maldev - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Handbook_V_-_Maldev"/>
	<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Handbook_V_-_Maldev&amp;action=history"/>
	<updated>2026-04-06T00:03:44Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Handbook_V_-_Maldev&amp;diff=2282&amp;oldid=prev</id>
		<title>Administrator at 22:11, 17 February 2026</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Handbook_V_-_Maldev&amp;diff=2282&amp;oldid=prev"/>
		<updated>2026-02-17T22:11:43Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://book.ghanim.no/index.php?title=Handbook_V_-_Maldev&amp;amp;diff=2282&amp;amp;oldid=1210&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Administrator</name></author>
	</entry>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Handbook_V_-_Maldev&amp;diff=1210&amp;oldid=prev</id>
		<title>imported&gt;Aghanim at 12:44, 20 December 2023</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Handbook_V_-_Maldev&amp;diff=1210&amp;oldid=prev"/>
		<updated>2023-12-20T12:44:23Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[File:2023-12-image-6.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Work in Progress&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Courses ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://institute.sektor7.net/ SEKTOR7 Institute]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://maldevacademy.com/ https://maldevacademy.com/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
EvasionEDR By Matt Hand&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sources ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! URL&lt;br /&gt;
! Description&lt;br /&gt;
! Category&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/NUL0x4C/HellShell https://github.com/NUL0x4C/HellShell]&lt;br /&gt;
| HellShell GitHub repository&lt;br /&gt;
| Penetration Testing&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/#weapon https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/#weapon]&lt;br /&gt;
| Exploit writing tutorial on Corelan.be&lt;br /&gt;
| Exploit Development&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.corelan.be/ https://www.corelan.be/]&lt;br /&gt;
| Corelan.be website&lt;br /&gt;
| Cybersecurity&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Krypteria/AtlasLdr https://github.com/Krypteria/AtlasLdr]&lt;br /&gt;
| AtlasLdr GitHub repository&lt;br /&gt;
| Malware Analysis&lt;br /&gt;
|-&lt;br /&gt;
| [https://labs.jumpsec.com/obfuscating-c2-during-a-red-team-engagement/ https://labs.jumpsec.com/obfuscating-c2-during-a-red-team-engagement/]&lt;br /&gt;
| Article on obfuscating C2 during Red Team engagement&lt;br /&gt;
| Red Teaming&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/matterpreter/DefenderCheck https://github.com/matterpreter/DefenderCheck]&lt;br /&gt;
| DefenderCheck GitHub repository&lt;br /&gt;
| Security Tools&lt;br /&gt;
|-&lt;br /&gt;
| [https://pinvoke.net/ https://pinvoke.net/]&lt;br /&gt;
| PInvoke.net - Platform Invoke for .NET&lt;br /&gt;
| Programming&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0 https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0]&lt;br /&gt;
| ConfuserEx GitHub repository (v1.6.0 release)&lt;br /&gt;
| Malware Analysis&lt;br /&gt;
|-&lt;br /&gt;
| [https://virusscan.jotti.org/en-US/scan-file https://virusscan.jotti.org/en-US/scan-file]&lt;br /&gt;
| Jotti&amp;#039;s Virus Scan - File scanning tool&lt;br /&gt;
| Antivirus&lt;br /&gt;
|-&lt;br /&gt;
| [https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-low https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-low]&lt;br /&gt;
| Article on direct syscalls in Red Teaming&lt;br /&gt;
| Red Teaming&lt;br /&gt;
|-&lt;br /&gt;
| [https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/ https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/]&lt;br /&gt;
| Raspberry Robin anti-evasion exploit analysis&lt;br /&gt;
| Exploit Analysis&lt;br /&gt;
|-&lt;br /&gt;
| [https://vanmieghem.io/process-injection-evading-edr-in-2023/ https://vanmieghem.io/process-injection-evading-edr-in-2023/]&lt;br /&gt;
| Article on process injection and EDR evasion&lt;br /&gt;
| Cybersecurity&lt;br /&gt;
|-&lt;br /&gt;
| [https://redsiege.com/blog/2023/04/evading-crowdstrike-falcon-using-entropy/ https://redsiege.com/blog/2023/04/evading-crowdstrike-falcon-using-entropy/]&lt;br /&gt;
| Evading Crowdstrike Falcon using entropy&lt;br /&gt;
| Evasion Techniques&lt;br /&gt;
|-&lt;br /&gt;
| [https://evasions.checkpoint.com/ https://evasions.checkpoint.com/]&lt;br /&gt;
| Check Point Evasions - Evasion techniques&lt;br /&gt;
| Evasion Techniques&lt;br /&gt;
|-&lt;br /&gt;
| [https://vx-underground.org/ https://vx-underground.org/]&lt;br /&gt;
| VX Underground - Malware and Exploit Community&lt;br /&gt;
| Malware Analysis&lt;br /&gt;
|-&lt;br /&gt;
| [https://unprotect.it/ Home - Unprotect Project]&lt;br /&gt;
| Search Evasion Techniques&lt;br /&gt;
| Evasion Techniques&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== x86 &amp;amp; x64 Assembler and Disassembler ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wondering what your shellcode is doing? This website will disassemble it for you and show the instructions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://defuse.ca/online-x86-assembler.htm# Online x86 and x64 Intel Instruction Assembler]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2023-12-image-7.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Callback function list ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/aahmad097/AlternativeShellcodeExec aahmad097/AlternativeShellcodeExec: Alternative Shellcode Execution Via Callbacks (github.com)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
According to Microsoft, a callback function is code within a managed application that helps an unmanaged DLL function complete a task. Calls to a callback function pass indirectly from a managed application, through a DLL function, and back to the managed implementation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Example: Using  ​CertEnumSystemStore​  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://docs.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-certenumsystemstore MSDN Documentation for CertEnumSystemStore]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;c&amp;quot;&amp;gt;&lt;br /&gt;
#include&lt;br /&gt;
#include&lt;br /&gt;
#include&lt;br /&gt;
&lt;br /&gt;
// Shellcode payload&lt;br /&gt;
unsigned char shellcode[] =&lt;br /&gt;
&amp;quot;\x90\x90\x90\x90&amp;quot;  // NOPs for padding&lt;br /&gt;
&amp;quot;\xcc&amp;quot;;             // INT 3 (breakpoint for debugging)&lt;br /&gt;
&lt;br /&gt;
BOOL WINAPI Payload(const void *pvSystemStore, DWORD dwFlags, PCERT_SYSTEM_STORE_INFO pStoreInfo, void *pvReserved, void *pvArg) {&lt;br /&gt;
    ((void(*)())shellcode)();&lt;br /&gt;
    return TRUE;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
int main() {&lt;br /&gt;
    if (!CertEnumSystemStore(CERT_SYSTEM_STORE_CURRENT_USER, NULL, NULL, Payload)) {&lt;br /&gt;
        printf(&amp;quot;[!] CertEnumSystemStore Failed With Error : %d \n&amp;quot;, GetLastError());&lt;br /&gt;
        return -1;&lt;br /&gt;
    }&lt;br /&gt;
    return 0;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Convert raw shellcode to raw binary format ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use CyberChef. Copy the shellcode to Cyberchef and choose &amp;quot;From Hex&amp;quot; as operations. Then save the output to .bin. This can be done the other way around also. From raw binary to shellcode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2023-12-image-8.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2023-12-image-9.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== EDR Telematry ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/u/0/d/1ZMFrD6F6tvPtf_8McC-kWrNBBec_6Si3NW6AoWf3Kbg/htmlview?pli=1 EDR Telemetry Tracking for Windows - Google Drive]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/e/2PACX-1vTwYjAK5x_9e_xA8UP83iTErnTmg4_JrHbEYrWLRGDcICpqw5hRAoLNNF6SCwQkQTVRyVMNsur7zy6t/pubhtml?gid=1993314609&amp;amp;single=true&amp;amp;widget=true&amp;amp;headers=false Embedded Content]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== EDR Telematry v2 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.edr-telemetry.com/windows.html EDR Telemetry Project - Windows]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Entropy reduction ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Reducing entroy makes the data appear less random. A high entropy might indicate encryption and some EDRs might raise suspicion. Some of the techniques to reduce entroyp is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Encoding After Encryption&amp;#039;&amp;#039;&amp;#039;: Applying encoding like URL encoding reduces the range of characters used (e.g., using only alphanumeric characters and fewer symbols) while preserving the data&amp;#039;s integrity. This limits the number of unique bytes, decreasing the perceived randomness.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Disguising the Encoded Payload&amp;#039;&amp;#039;&amp;#039;: After encoding, disguise the payload by embedding it into seemingly legitimate data, such as fake URLs, CSV files, or even certificates. This helps evade detection during analysis or reverse engineering.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Loader Decoding and Execution&amp;#039;&amp;#039;&amp;#039;: The loader should read and decode the disguised data, reverting it to its original form before execution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== HijackLibs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://hijacklibs.net/ HijackLibs]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
This project provides an curated list of DLL Hijacking candidates. A mapping between DLLs and vulnerable executables is kept and can be searched via this website. Additionally, further metadata such as resources provide more context.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Joesandbox - Malware Analysis ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Can analyze malicous websites and files. Collections available.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.joesandbox.com/#windows Automated Malware Analysis - Joe Sandbox Cloud Basic]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.joesecurity.org/ Deep Malware and Phishing Analysis - Joe Sandbox]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Malapi.io ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://malapi.io/ MalAPI.io]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
MalAPI.io maps [https://docs.microsoft.com/en-us/windows/win32/apiindex/windows-api-list Windows APIs] to common techniques used by malware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== No-defender ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/es3n1n/no-defender es3n1n/no-defender: A slightly more fun way to disable windows defender + firewall. (through the WSC api) (github.com)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NtDoc - The native NT API online documentation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://ntdoc.m417z.com/ NtDoc - The native NT API online documentation (m417z.com)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
This collection of Native API header files has been maintained since 2009 for the Process Hacker project, and is the most up-to-date set of Native API definitions that I know of. I have gathered these definitions from official Microsoft header files and symbol files, as well as a lot of reverse engineering and guessing. See &amp;lt;code&amp;gt;phnt.h&amp;lt;/code&amp;gt; for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Parasite-invoke ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/MzHmO/Parasite-Invoke MzHmO/Parasite-Invoke: Hide your P/Invoke signatures through other people&amp;#039;s signed assemblies (github.com)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
Hide your P/Invoke signatures through other people&amp;#039;s signed assemblies!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2024-06-image.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reverse engineering of everything Microsoft ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.geoffchappell.com/index.htm Geoff Chappell, Software Analyst]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel, Win32, Shell, Internet Explorer, Visual C++.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Vergilius project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.vergiliusproject.com/about Vergilius Project | About]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
This project provides a collection of Microsoft Windows kernel structures, unionsand enumerations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Unprotect.it ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://unprotect.it/ Home - Unprotect Project]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2024-06-image-1.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [https://evasions.checkpoint.com/ Evasion techniques] ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://evasions.checkpoint.com/ Evasion techniques (checkpoint.com)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
In this encyclopedia we have attempted to gather all the known ways to detect virtualized environment grouping them into big categories. Some categories are inactive on main page: it means that content will be added later. If it isn’t stated explicitly which operating system is described, Windows is meant by default.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2024-06-image-2.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Windows Icons ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Windows Icon locations:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
%systemroot%\system32\imageres.dll&lt;br /&gt;
%systemroot%\system32\shell32.dll&lt;br /&gt;
%systemroot%\system32\ddores.dll&lt;br /&gt;
%systemroot%\system32\pifmgr.dll&lt;br /&gt;
%systemroot%\explorer.exe&lt;br /&gt;
%systemroot%\system32\accessibilitycpl.dll&lt;br /&gt;
%systemroot%\system32\moricons.dll&lt;br /&gt;
%systemroot%\system32\mmcndmgr.dll&lt;br /&gt;
%systemroot%\system32\mmres.dll&lt;br /&gt;
%systemroot%\system32\netcenter.dll&lt;br /&gt;
%systemroot%\system32\netshell.dll&lt;br /&gt;
%systemroot%\system32\networkexplorer.dll&lt;br /&gt;
%systemroot%\system32\pnidui.dll&lt;br /&gt;
%systemroot%\system32\sensorscpl.dll&lt;br /&gt;
%systemroot%\system32\setupapi.dll&lt;br /&gt;
%systemroot%\system32\wmploc.dll&lt;br /&gt;
%systemroot%\system32\wpdshext.dll&lt;br /&gt;
%systemroot%\system32\compstui.dll&lt;br /&gt;
%systemroot%\system32\ieframe.dll&lt;br /&gt;
%systemroot%\system32\dmdskres.dll&lt;br /&gt;
%systemroot%\system32\dsuiext.dll&lt;br /&gt;
%systemroot%\system32\mstscax.dll&lt;br /&gt;
%systemroot%\system32\wiashext.dll&lt;br /&gt;
%systemroot%\system32\comres.dll&lt;br /&gt;
%systemroot%\system32\mstsc.exe&lt;br /&gt;
%systemroot%\system32\actioncentercpl.dll&lt;br /&gt;
%systemroot%\system32\aclui.dll&lt;br /&gt;
%systemroot%\system32\autoplay.dll&lt;br /&gt;
%systemroot%\system32\comctl32.dll&lt;br /&gt;
%systemroot%\system32\filemgmt.dll&lt;br /&gt;
%systemroot%\system32\ncpa.cpl&lt;br /&gt;
%systemroot%\system32\url.dll&lt;br /&gt;
%systemroot%\system32\xwizards.dll&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Iconfinder:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.iconfinder.com/search Icons - Iconfinder]&lt;br /&gt;
&lt;br /&gt;
[[Category:Handbooks]]&lt;br /&gt;
[[Category:Malware Development]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Aghanim</name></author>
	</entry>
</feed>